Font Size: a A A

Research On Secure Data Aggregation In Wireless Sensor Networks

Posted on:2015-03-09Degree:DoctorType:Dissertation
Country:ChinaCandidate:C X LiuFull Text:PDF
GTID:1268330425489211Subject:Information networks and security
Abstract/Summary:PDF Full Text Request
ABSTRACT:Data aggregation technique has been widely used in practical applications for wireless sensor networks, because it can effectively reduce the data transmission, improve the accuracy of the information and data collection efficiency, prolong the network lifetime. Though data aggregation technique can greatly reduce energy consumption for WSNs, it also introduces additional security concerns, like eavesdropping, data tamper, data forge, reply attacks, node invasion, increasing the delay. So the research on the theories and methods of secure data aggregation has great significance for wireless sensor network.The thesis of the dissertation is supported by National Natural Science Foundation of China (No.61071076), Young Scientist Project of Natural Science Foundation of China (NO.61201159),863P rogram (No.2011AA010104-2), Academic Discipline and Postgraduate Education Project of Beijing Municipal Commission of Education. Main contributions of the dissertation are as follows:(1). The thesis presents integrity-protecting secure hierarchical encrypted-data aggregation algorithm based on regional cluster management and homomorphic encryption. The algorithm improves2-DNF algorithm based on regionalization management and achieves homomorphic encryption and end-to-end secure data aggregation for the data in different regionals. Meanwhile, this algorithm uses aggregating results’ message authentication code to confirm that base station authenticate whether the transmitted aggregating data is changed. The security and performance analysis shows that the algorithm has lower computational and communication overheads and great resistance to various attacks, like middleman attack, data injection, node capture attack and impersonation attacks. It also providing effective protective measures to keep the network secure after the keys are exposured.(2). The thesis presents an improved reliable trust-based secure data aggregation algorithm of wireless sensor network. The algorithm proposes a hybrid trust management model to observe the nodes’ actions, access the reputation and trustworthiness of nodes’actions, like sensoring, aggregating and transmitting, and make an evaluation whether node intrusion is happening. Taking nodes’trustworthiness, energy and nodes’link availability into comprehensive consideration, the hybrid trust management model uses Beta trust model to look for best aggregating nodes based on the equilibrium between nodes’trust and energy, while it also looks for better forwarding nodes based on the equilibrium between nodes’trust and connectivity to build the new routing path and to achieve secure transmission of aggregated data. In addition, the algorithm also proposes a node recovery mechanism for the hybrid trust management model to check compromise nodes’children nodes and to help them find new parents, which effectively prevents the emergence of isolated nodes and increases the efficiency of node utilization.(3). The thesis presents a high energy-efficient and privacy-preserving secure data aggregation algorithm. The algorithm includes nodes’data privacy-preserving algorithm based on differentiated segmentation strategy, data query mechanism and secure data aggregation algorithm based on hierarchical cutting strategy. Taking various issues, like data privacy, communication overhead and energy consumption, the algorithm uses differentiated segmentation strategy to find best data cutting strategy to form a better secure data aggregation scheme, which enhances the degree of aggregated data privacy and reduce the amount of transmitted and exchanged data slices in the network. The performance analysis shows that the algorithm achieves stronger privacy protection of aggregated data, lower communication overhead and more optimal energy efficiency.(4). The thesis proposes an key negotiation and authentication protocol based on quadratic residues theory for wireless sensor networks. In order to confirm new nodes’ identity legitimacy in data aggregation, the protocol creates a dynamic updated authenticator based on the number of authentication rounds and authentication key. It utilizes request-response and authenticator mechanisms to complete the authentication between nodes. In addition, the protocol encrypts the information of authenticator and authentication key based on quadratic residues theory to achieve the communication security of exchanged session keys. The security analysis shows that the key negotiation and authentication protocol has lower computational and communication overheads and great resistance to various attacks, like node capture attack and impersonation attacks, and achieves the forward secrecy.
Keywords/Search Tags:Wireless sensor networks, Secure data aggregation, Integrity protection, Security, Homomorphic encryption, Privacy preservation, Trust management
PDF Full Text Request
Related items